A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection

Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based sys...

Full description

Saved in:
Bibliographic Details
Main Authors: Nordin, Noor Syahirah, Ismail, Mohd. Arfian, Sutikno, Tole, Kasim, Shahreen, Hassan, Rohayanti, Zakaria, Zalmiyah, Mohamad, Mohd. Saberi
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/94806/1/ZalmiyahZakaria2021_AComparativeAnalysisofMetaheuristicAlgorithms.pdf
http://eprints.utm.my/id/eprint/94806/
http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1146-1158
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.94806
record_format eprints
spelling my.utm.948062022-04-29T22:27:17Z http://eprints.utm.my/id/eprint/94806/ A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection Nordin, Noor Syahirah Ismail, Mohd. Arfian Sutikno, Tole Kasim, Shahreen Hassan, Rohayanti Zakaria, Zalmiyah Mohamad, Mohd. Saberi QA75 Electronic computers. Computer science Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure. Institute of Advanced Engineering and Science 2021-08 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/94806/1/ZalmiyahZakaria2021_AComparativeAnalysisofMetaheuristicAlgorithms.pdf Nordin, Noor Syahirah and Ismail, Mohd. Arfian and Sutikno, Tole and Kasim, Shahreen and Hassan, Rohayanti and Zakaria, Zalmiyah and Mohamad, Mohd. Saberi (2021) A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection. Indonesian Journal of Electrical Engineering and Computer Science, 23 (2). pp. 1146-1158. ISSN 2502-4752 http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1146-1158 DOI:10.11591/ijeecs.v23.i2.pp1146-1158
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Nordin, Noor Syahirah
Ismail, Mohd. Arfian
Sutikno, Tole
Kasim, Shahreen
Hassan, Rohayanti
Zakaria, Zalmiyah
Mohamad, Mohd. Saberi
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
description Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure.
format Article
author Nordin, Noor Syahirah
Ismail, Mohd. Arfian
Sutikno, Tole
Kasim, Shahreen
Hassan, Rohayanti
Zakaria, Zalmiyah
Mohamad, Mohd. Saberi
author_facet Nordin, Noor Syahirah
Ismail, Mohd. Arfian
Sutikno, Tole
Kasim, Shahreen
Hassan, Rohayanti
Zakaria, Zalmiyah
Mohamad, Mohd. Saberi
author_sort Nordin, Noor Syahirah
title A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_short A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_full A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_fullStr A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_full_unstemmed A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
title_sort comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
publisher Institute of Advanced Engineering and Science
publishDate 2021
url http://eprints.utm.my/id/eprint/94806/1/ZalmiyahZakaria2021_AComparativeAnalysisofMetaheuristicAlgorithms.pdf
http://eprints.utm.my/id/eprint/94806/
http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1146-1158
_version_ 1732945396387282944
score 13.209306